Home Malware Programs Trojans BackStealth

BackStealth

Posted: March 28, 2006

This pest, which is able to bypass some security computers, sometimes can be used for data mining and other activities that can harm the security of the infected computer. Although it can bypass several Firewalls with its 'Stealth' technique, some other security computers are still able to catch it.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 backdll.dll
    2 backstealth.exe
Loading...